Sciweavers

1701 search results - page 47 / 341
» Providing k-anonymity in data mining
Sort
View
DKE
2010
167views more  DKE 2010»
14 years 7 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
VLDB
2001
ACM
139views Database» more  VLDB 2001»
15 years 2 months ago
NetCube: A Scalable Tool for Fast Data Mining and Compression
We propose an novel method of computing and storing DataCubes. Our idea is to use Bayesian Networks, which can generate approximate counts for any query combination of attribute v...
Dimitris Margaritis, Christos Faloutsos, Sebastian...
BMCBI
2010
153views more  BMCBI 2010»
14 years 10 months ago
PPLook: an automated data mining tool for protein-protein interaction
Background: Extracting and visualizing of protein-protein interaction (PPI) from text literatures are a meaningful topic in protein science. It assists the identification of inter...
Shao-Wu Zhang, Yao-Jun Li, Li Xia, Quan Pan
ICDE
2009
IEEE
192views Database» more  ICDE 2009»
15 years 11 months ago
Deriving Private Information from Association Rule Mining Results
Data publishing can provide enormous benefits to the society. However, due to privacy concerns, data cannot be published in their original forms. Two types of data publishing can a...
Zutao Zhu, Guan Wang, Wenliang Du
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 2 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok